236 resultados para puzzles


Relevância:

10.00% 10.00%

Publicador:

Resumo:

How games can be designed to engage families in learning spaces outside of the classroom. SCOOT Game has been played by families in various science museums and art galleries in Australian capital cities since 2004. Families form groups to collaborate in the game that takes them on an SMS quest through these places engaging them with artworks, historic facts, landmarks, puzzles, street performances etc.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Gradual authentication is a principle proposed by Meadows as a way to tackle denial-of-service attacks on network protocols by gradually increasing the confidence in clients before the server commits resources. In this paper, we propose an efficient method that allows a defending server to authenticate its clients gradually with the help of some fast-to-verify measures. Our method integrates hash-based client puzzles along with a special class of digital signatures supporting fast verification. Our hash-based client puzzle provides finer granularity of difficulty and is proven secure in the puzzle difficulty model of Chen et al. (2009). We integrate this with the fast-verification digital signature scheme proposed by Bernstein (2000, 2008). These schemes can be up to 20 times faster for client authentication compared to RSA-based schemes. Our experimental results show that, in the Secure Sockets Layer (SSL) protocol, fast verification digital signatures can provide a 7% increase in connections per second compared to RSA signatures, and our integration of client puzzles with client authentication imposes no performance penalty on the server since puzzle verification is a part of signature verification.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Just Fast Keying (JFK) is a simple, efficient and secure key exchange protocol proposed by Aiello et al. (ACM TISSEC, 2004). JFK is well known for its novel design features, notably its resistance to denial-of-service (DoS) attacks. Using Meadows’ cost-based framework, we identify a new DoS vulnerability in JFK. The JFK protocol is claimed secure in the Canetti-Krawczyk model under the Decisional Diffie-Hellman (DDH) assumption. We show that security of the JFK protocol, when reusing ephemeral Diffie-Hellman keys, appears to require the Gap Diffie-Hellman (GDH) assumption in the random oracle model. We propose a new variant of JFK that avoids the identified DoS vulnerability and provides perfect forward secrecy even under the DDH assumption, achieving the full security promised by the JFK protocol.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

If contemporary artworks are often considered to be puzzles or riddles, then Wilkins Hill take this to a new level. Their recent exhibition Windows impersonating other windows, confronts viewers with an extremely ludic configuration: a spa bath full of almonds, towel racks placed before photos of Martin Heidegger distorted in neat grids, a video of a water tower in a Hamburg park, wooden cut-out speech bubbles and monitors that continuously play interviews with the artists themselves. What does it all mean?

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Nonprofit organizations present the analyst with a slew of puzzles. To an economist conditioned to think in terms of objectives and constraints, even the mathematical definition of the beast is a problem. What is a nonprofit organization? How does this definition shape the elaboration of objectives and constraints?

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Mastering Medical Terminology: Australia and New Zealand Workbook is the indispensable companion to Mastering Medical Terminology Textbook. Packed with a range of exercises and activities to accompany the main text, the Workbook provides an ideal resource for self-testing and revision in a fun, practical and accessible format, and forms a key part of the Mastering Medical Terminology suite of products which are all available for separate purchase enabling you to pick and choose the right package for your learning requirements. Featuring a variety of question types including crossword puzzles, anagrams, multiple-choice questions and label-the-diagram exercises, the Workbook uses entirely Australian spelling and aligns to the chapters of the main text. When used in combination with the main text and MedWords app, Mastering Medical Terminology: Australia and New Zealand Workbook will make the scholarship of medical terminology not only manageable, but fun!

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Availability has become a primary goal of information security and is as significant as other goals, in particular, confidentiality and integrity. Maintaining availability of essential services on the public Internet is an increasingly difficult task in the presence of sophisticated attackers. Attackers may abuse limited computational resources of a service provider and thus managing computational costs is a key strategy for achieving the goal of availability. In this thesis we focus on cryptographic approaches for managing computational costs, in particular computational effort. We focus on two cryptographic techniques: computational puzzles in cryptographic protocols and secure outsourcing of cryptographic computations. This thesis contributes to the area of cryptographic protocols in the following ways. First we propose the most efficient puzzle scheme based on modular exponentiations which, unlike previous schemes of the same type, involves only a few modular multiplications for solution verification; our scheme is provably secure. We then introduce a new efficient gradual authentication protocol by integrating a puzzle into a specific signature scheme. Our software implementation results for the new authentication protocol show that our approach is more efficient and effective than the traditional RSA signature-based one and improves the DoSresilience of Secure Socket Layer (SSL) protocol, the most widely used security protocol on the Internet. Our next contributions are related to capturing a specific property that enables secure outsourcing of cryptographic tasks in partial-decryption. We formally define the property of (non-trivial) public verifiability for general encryption schemes, key encapsulation mechanisms (KEMs), and hybrid encryption schemes, encompassing public-key, identity-based, and tag-based encryption avors. We show that some generic transformations and concrete constructions enjoy this property and then present a new public-key encryption (PKE) scheme having this property and proof of security under the standard assumptions. Finally, we combine puzzles with PKE schemes for enabling delayed decryption in applications such as e-auctions and e-voting. For this we first introduce the notion of effort-release PKE (ER-PKE), encompassing the well-known timedrelease encryption and encapsulated key escrow techniques. We then present a security model for ER-PKE and a generic construction of ER-PKE complying with our security notion.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Key Features: "Aligns to Mastering Medical Terminology: Australia and New Zealand. Self-test to practise and revise combining forms, word roots, prefixes and suffixes. Crossword puzzles, anagrams and label-the-diagram exercises Also available iOS/Android app featuring audio glossary, flashcards and MCQs."--publisher website

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this chapter we describe and explain the ways we negotiated these same epistemological tensions and structural realities as we implemented the iPad loan component of the project reported in this book (hereafter: “iPad loan program”).Children who participated in the iPad loan program were able to take home one of the project iPads used in their preschool centre, much as they were able to take home books and puzzles. This component was one reflection of the ethos of “digital inclusion” that infused the project. As we noted in the introduction to this book, there is international recognition of the role that schools can play in ensuring all communities can participate in digital culture and the digital economy (e.g., European Commission, 2014; United States Government, 2013). Accordingly, we conducted the project in preschool centres where at least some groups of children were thought to enjoy less access to learning on digital platforms than others. Our goal was to put the iPad into the hands of children who might not otherwise have had access to it, while supporting teachers and parents in capitalising on the learning potential of the device for all the children. Centres nominated for the project by administrators in the preschool system all served communities that were either affected by poverty and/or diverse in language and culture.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this chapter, we explore methods for automatically generating game content—and games themselves—adapted to individual players in order to improve their playing experience or achieve a desired effect. This goes beyond notions of mere replayability and involves modeling player needs to maximize their enjoyment, involvement, and interest in the game being played. We identify three main aspects of this process: generation of new content and rule sets, measurement of this content and the player, and adaptation of the game to change player experience. This process forms a feedback loop of constant refinement, as games are continually improved while being played. Framed within this methodology, we present an overview of our recent and ongoing research in this area. This is illustrated by a number of case studies that demonstrate these ideas in action over a variety of game types, including 3D action games, arcade games, platformers, board games, puzzles, and open-world games. We draw together some of the lessons learned from these projects to comment on the difficulties, the benefits, and the potential for personalized gaming via adaptive game design.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Monte-Carlo Tree Search (MCTS) is a heuristic to search in large trees. We apply it to argumentative puzzles where MCTS pursues the best argumentation with respect to a set of arguments to be argued. To make our ideas as widely applicable as possible, we integrate MCTS to an abstract setting for argumentation where the content of arguments is left unspecified. Experimental results show the pertinence of this integration for learning argumentations by comparing it with a basic reinforcement learning.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The puzzle depicts five people in a domestic interior. A woman leans towards a window. The speech bubble above her head reads "Yoo-hoo! Mrs. Bloom!". A man holding a newspaper sits in a recliner. An older, bald-headed man stands, gesturing. A boy plays the violin at right, accompanied by a girl at the piano. The characters are identified in the border below: Mollie, Jake, David, Sammy, and Rosie.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This thesis is an assessment of the hoax hypothesis, mainly propagated in Stephen C. Carlson's 2005 monograph "The Gospel Hoax: Morton Smith's Invention of Secret Mark", which suggests that professor Morton Smith (1915-1991) forged Clement of Alexandria's letter to Theodore. This letter Smith claimed to have discovered as an 18th century copy in the monastery of Mar Saba in 1958. The Introduction narrates the discovery story of Morton Smith and traces the manuscript's whereabouts up to its apparent disappearance in 1990 following with a brief history of scholarship of the MS and some methodological considerations. Chapters 2 and 3 deal with the arguments for the hoax (mainly by Stephen C. Carlson) and against it (mainly Scott G. Brown). Chapter 2 looks at the MS in its physical aspects, and chapter 3 assesses its subject matter. I conclude that some of the details fit reasonably well with the hoax hypothesis, but on the whole the arguments against it are more persuasive. Especially Carlson's use of QDE-analysis (Questioned Document Examination) has many problems. Comparing the handwriting of Clement's letter to Morton Smith's handwriting I conclude that there are some "repeated differences" between them suggesting that Smith is not the writer of the disputed letter. Clement's letter to Theodore derives most likely from antiquity though the exact details of its character are not discussed in length in this thesis. In Chapter 4 I take a special look at Stephen C. Carlson's arguments which propose that Morton Smith hid clues of his identity to the MS and the materials surrounding it. Comparing these alleged clues to known pseudoscientific works I conclude that Carlson utilizes here methods normally reserved for building a conspiracy theory; thus Carlson's hoax hypothesis has serious methodological flaws in respect to these hidden clues. I construct a model of these questionable methods titled "a boisterous pseudohistorical method" that contains three parts: 1) beginning with a question that from the beginning implicitly contains the answer, 2) considering everything will do as evidence for the conspiracy theory, and 3) abandoning probability and thinking literally that everything is connected. I propose that Stephen C. Carlson utilizes these pseudoscientific methods in his unearthing of Morton Smith's "clues". Chapter 5 looks briefly at the literary genre I title "textual puzzle -thriller". Because even biblical scholarship follows the signs of the times, I propose Carlson's hoax hypothesis has its literary equivalents in fiction in titles like Dan Brown's "Da Vinci Code" and in academic works in titles like John Dart's "Decoding Mark". All of these are interested in solving textual puzzles, even though the methodological choices are not acceptable for scholarship. Thus the hoax hypothesis as a whole is alternatively either unpersuasive or plain bad science.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Managerial pay-for-performance sensitivity has increased rapidly around the world. Early empirical research showed that pay-for-performance sensitivity resulting from stock ownership and stock options appeared to be quite low during the 1970s and early 1980s in the U.S. However, recent empirical research from the U.S. shows an enormous increase in pay-for-performance sensitivity. The global trend has also reached Finland, where stock options have become a major ingredient of executive compensation. The fact that stock options seem to be an appealing form of remuneration from a theoretical point of view combined with the observation that the use of this compensation form has increased significantly during the recent years, implies that research on the dynamics of stock option compensation is highly relevant for the academic community, as well as for practitioners and regulators. The research questions of the thesis are analyzed in four separate essays. The first essay examines whether stock option compensation practices of Finnish firms are consistent with predictions from principal-agent theory. The second essay explores one of the major puzzles in the compensation literature by studying determinants of stock option contract design. In theory, optimal contract design should vary according to firm characteristics. However, in the U.S., variation in contract design seems to be surprisingly low, a phenomenon generally attributed to tax and accounting considerations. In Finland, however, firms are not subject to stringent contracting restrictions, and the variation in contract design tends, in fact, to be quite substantial. The third essay studies the impact of price- and risk incentives arising from stock option compensation on firm investment. In addition, the essay explores one of the most debated questions in the literature, in particular, the relation between incentives and firm performance. Finally, several strands of literature in both economics and corporate finance hypothesize that economic uncertainty is related to corporate decision-making. Previous research has shown that risk tends to slow down firm investment. In the fourth essay, it is hypothesized that firm risk slows down growth from a more universal perspective. Consistent with this view, it is shown that risk not only tends to slow down firm investment, but also employment growth. Moreover, the essay explores whether the nature of firms’ compensation policies, in particular, whether firms make use of stock option compensation, affects the relation between risk and firm growth. In summary, the four essays contribute to the current understanding of stock options as a form of equity incentives, and how incentives and risk affect corporate decision-making. By this, the thesis promotes the knowledge related to the modern theory of the firm.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A galactic disk in a spiral galaxy is generally believed to be embedded in an extended dark matter halo, which dominates its dynamics in the outer parts. However, the shape of the halo is not clearly understood. Here we show that the dark matter halo in the Milky Way is prolate in shape. Further, it is increasingly more prolate at larger radii, with the vertical-to-planar axis ratio monotonically increasing to 2.0 at 24 kpc. This is obtained by modeling the observed steeply flaring atomic hydrogen gas layer in the outer Galactic disk, where the gas is supported by pressure against the net gravitational field of the disk and the halo. The resulting prolate-shaped halo can explain several long-standing puzzles in galactic dynamics, for example, it permits long-lived warps thus explaining their ubiquitous nature.